Anda di halaman 1dari 20

Gasesti la adresa:

https://ccnav6.com/ccna-semester-1-v6-0-study-materials-labs-online-course.html

CCNA Semester 1 v6.0 Study Materials and Labs – Online Course CCNA Exam Answers 2017 September 22, 2017

Chapters Study Materials Packet Tracer Labs Online Assignments

Explore the
1 Network 1.2.4.4 Assignment

Configure a
Network Operating
2 System 2.1.4.6/2.1.4.8, 2.2.3.3/2.2.3.4, 2.3.2.5, 2.4.1.2 Assignment

Network Protocols
and
3 Communications 3.2.4.6, 3.3.3.3 Assignment

4 Network Access 4.2.4.4/4.2.4.5 Assignment

5 Ethernet 5.1.4.4, 5.3.3.5 Assignment

6 Network Layer 6.3.1.8/6.3.1.10, 6.4.3.3, 6.4.3.4, 6.5.1.2/6.5.1.3 Assignment

7 IP Addressing 7.2.4.9, 7.3.1.2, 7.3.2.5, 7.3.2.6, 7.3.2.9, 7.4.1.2 Assignment

Subnetting IP 8.1.4.7, 8.2.1.4, 8.2.5.3, 8.3.1.4, 8.3.2.5, 8.3.2.6, 8.3.2.8, 8.


8 Networks 4.1.2 Assignment

9 Transport Layer 9.1.4.6, 9.1.4.7, 9.2.1.5, 9.3.1.2, 9.3.1.4, 9.4.1.2 Assignment

10.2.1.7/10.2.1.8, 10.2.2.7/10.2.2.8, 10.3.1.3/10.4.1.2, 10.3


10 Application Layer .1.4/10.4.1.3 Assignment

Build a Small 11.2.4.5, 11.2.4.5, 11.3.2.2, 11.3.3.3/11.3.3.4, 11.4.1.2, 11.


11 Network 4.1.3, 11.5.2.4, 11.2.4.5 Assignment

Si acum pe larg:
CCNA 1 LABS - PACKET TRACER

1.2.4.4 Packet Tracer – Representing the Network


Instructions Answers
Representing the Network Instructions Answers
All clients have full connectivity to the servers. For the sake of frame diversity, the environment is not
entirely realistic. For instance:
– NAT and PAT overload are both used on the Branch network, but the Central 10.X.X.X network is shared
publicly.
– There is a separate DNS server in the 172 network because the computers cannot use the filer server’s
public address. The simulated DNS server, unlike BIND, is basic and does not forward requests that it does
not know to a root server. Therefore, the A records are duplicated.
– EIGRP is running in the cloud, instead of BGP.
– The Branch switch is providing DHCP, just because it can. It makes that side of the simulation different
than the Central side.
– The cloud includes two servers. One server uses the correct IP (netacad.com). The other server uses the
correct IP of Google’s DNS.
– The router passwords are “cisco” and “class”, but there is a “banner motd” and “banner login” which
readily provide the passwords.
– The S1 and S2 switches have spanning tree PVST enabled. Each has a different blocking port, so all
connections are green.

1.2.4.4 Packet Tracer – Representing the Network Instructions Answers


Objectives
Part 1: Overview of the Packet Tracer Program
Part 2: Exploring LANs, WANs, and Internets
Background
Packet Tracer is a fun, take-home, flexible software program which will help you with your Cisco
Certified Network Associate (CCNA) studies. Packet Tracer allows you to experiment with network
behavior, build network models, and ask “what if” questions.

In this activity, you will explore a relatively complex network that highlights a few of Packet
Tracer’s features. While doing so, you will learn how to access Help and the tutorials. You will also
learn how to switch between various modes and workspaces. Finally, you will explore how Packet
Tracer serves as a modeling tool for network representations.

Note: It is not important that you understand everything you see and do in this activity. Feel free to
explore the network on your own. If you wish to proceed more systematically, follow the steps
below. Answer the questions to the best of your ability.
Part 1: Overview of the Packet Tracer Program
The network size is larger than most of the networks you will experience in this course (although
you will see this topology often in your Networking Academy studies). You may need to adjust the
window size of Packet Tracer to see the full network. If necessary, you can use the zoom in and
out tools to adjust the size of the Packet Tracer window.

Step 1: Access the Packet Tracer Help pages, tutorial videos, and online resources
a. Access the Packet Tracer Help pages in two ways:

1) Click the question mark icon in the top, right-hand corner of the menu toolbar.

2) Click the Help menu, and then choose Contents.


b. Access the Packet Tracer tutorial videos by clicking Help > Tutorials. These videos are a visual
demonstration of the information found in the Help pages and various aspects of the Packet
Tracer software program. Before proceeding with this activity, you should gain some familiarity
with the Packet Tracer interface and Simulation mode.
1) View the Interface Overview video in the Getting Started section of Tutorials.
2) View the Simulation Environment video in the Realtime and Simulation Modes section
of Tutorials.
c. Find the “Configuring Devices Using the Desktop Tab” tutorial. Watch the first part to answer the
following question: What information can you configure in the IP Configuration window?

You can choose DHCP or Static and configure the IP address, Subnet Mask, Default Gateway, and
DNS Server.
Step 2: Toggle between Realtime and Simulation modes.
a. Find the Realtime word in the bottom right corner of the Packet Tracer interface. In Realtime
mode, your network is always running like a real network, whether you are working on the network
or not. Your configurations are done in real time, and the network responds in near real time.

b. Click the tab directly behind the Realtime tab to switch to Simulation mode. In Simulation mode,
you can watch your network run at a slower pace, observing the paths that data takes and
inspecting the data packets in detail.
c. In the Simulation Panel, click Auto Capture / Play. You should now see data packets,
represented as envelopes of various colors, traveling between the devices.
d. Click Auto Capture / Play again to pause the simulation.
e. Click Capture / Forward to step through the simulation. Click the button a few more times to see
the effect.
f. In the network topology on the left, click one of the envelopes on an intermediate device and
investigate what is inside. Over the course of your CCNA studies, you will learn the meaning of
most everything inside these envelopes. For now, see if you can answer the following questions:

– Under the OSI Model tab, how many In Layers and Out Layers have information?
Answers will vary depending on the layer of the device.

– Under the Inbound PDU Details and Outbound PDU Details tabs, what are the headings of the
major sections?
Answers will vary, but likely answers will be Ethernet 802.3, LLC, STP BPDU, etc.

– Click back and forth between the Inbound PDU Details and Outbound PDU Details tabs. Do you
see information changing? If so, what?
Answers will vary, but the source and/or destination addresses in the data link layer are changing.
Other data may be changing as well depending on which packet the student chose to open.
g. Click the toggle button above Simulation in the bottom right corner to return to Realtime mode.
Step 3: Toggle between Logical and Physical views.
a. Find the Logical word in the top left corner of the Packet Tracer interface. You are currently in
the Logical workspace where you will spend the majority of your time building, configuring,
investigating, and troubleshooting networks.

Note: Although you can add a geographical map as the background image for the Logical
workspace, it does not usually have any relationship to the actual physical location of devices.
b. Click the tab below Logical to switch to the Physical workspace. The purpose of the Physical
workspace is to give a physical dimension to your Logical network topology. It gives you a sense
of scale and placement (how your network might look in a real environment).
c. During your CCNA studies, you will use this workspace on occasion. For now, just know that it
is here and available for you to use. To learn more about the Physical workspace, refer to the Help
files and tutorial videos.

d. Click the toggle button below Physical in the top right corner to return to the Logical workspace.

Part 2: Exploring LANs, WANs, and Internets


The network model in this activity incorporates many of the technologies that you will master in
your CCNA studies. It represents a simplified version of how a small to medium-sized business
network might look. Feel free to explore the network on your own. When ready, proceed through
the following steps and answer the questions.

Step 1: Identify common components of a network as represented in Packet Tracer.


a. The Icon toolbar has various categories of networking components. You should see categories
that correspond to intermediate devices, end devices, and media. The Connections category (with
the lightning bolt icon) represents the networking media supported by Packet Tracer. There is also
an End Devicescategory and two categories specific to Packet Tracer: Custom Made
Devices and Multiuser Connection.
b. List the intermediate device categories.

c. Without entering into the Internet cloud or Intranet cloud, how many icons in the topology
represent endpoint devices (only one connection leading to them)?
d. Without counting the two clouds, how many icons in the topology represent intermediate
devices (multiple connections leading to them)?

e. How many intermediate devices are routers? Note: The Linksys device is a router.
f. How many end devices are not desktop computers?

g. How many different types of media connections are used in this network topology?

h. Why isn’t there a connection icon for wireless in the Connections category?

Step 2: Explain the purpose of the devices.


a. In Packet Tracer, the Server-PT device can act as a server. The desktop and laptop PCs
cannot act as a server. Is that true in the real world? Based on your studies so far, explain the
client-server model.
b. List at least two functions of intermediary devices.

c. List at least two criteria for choosing a network media type.

Step 3: Compare and contrast LANs and WANs.


a. Explain the difference between a LAN and a WAN. Give examples of each.

b. In the Packet Tracer network, how many WANs do you see?

c. How many LANs do you see?

d. The Internet in this Packet Tracer network is overly simplified and does not represent the
structure and form of the real Internet. Briefly describe the Internet.

e. What are some of the common ways a home user connects to the Internet?

f. What are some common methods that businesses use to connect to the Internet in your area?

Challenge
Now that you have had an opportunity to explore the network represented in this Packet Tracer
activity, you may have picked up a few skills that you would like to try out. Or maybe you would
like the opportunity to explore this network in more detail. Realizing that most of what you see and
experience in Packet Tracer is currently beyond your skill level, here are some challenges you
might want to attempt. Do not worry if you cannot do them all. You will be a Packet Tracer master
user and network designer soon enough.

– Add an end device to the topology and connect it to one of the LANs with a media connection.
What else does this device need to send data to other end users? Can you provide the
information? Is there a way to verify that you correctly connected the device?
– Add a new intermediary device to one of the networks and connect it to one of the LANs or
WANs with a media connection. What else does this device need to serve as an intermediary to
other devices in the network?
– Open a new instance of Packet Tracer. Create a new network with at least two LANs connected
by a WAN. Connect all the devices. Investigate the original Packet Tracer activity to see what else
you might need to do to make your new network functional. Record your thoughts and save your
Packet Tracer file. You may want to revisit your network later after you have mastered a few more
skills.
Suggested Scoring Rubric

CCNA 1 LABS - PACKET TRACER

2.1.4.6/2.1.4.8 Packet Tracer – Navigating the IOS


Instructions Answers
Packet Tracer – Navigating the IOS

Objectives
Part 1: Basic Connections, Accessing the CLI and Exploring Help
Part 2: Exploring EXEC Modes

Part 3: Setting the Clock

Background
In this activity, you will practice skills necessary for navigating the Cisco IOS, including different
user access modes, various configuration modes, and common commands you use on a regular
basis. You also practice accessing the context-sensitive Help by configuring the clock command.

Part 1: Basic Connections, Accessing the CLI and Exploring Help


In Part 1 of this activity, you connect a PC to a switch using a console connection and explore
various command modes and Help features.

Step 1: Connect PC1 to S1 uses a console cable.


a. Click the Connections icon (the one that looks like a lightning bolt) in the lower left corner of the
Packet Tracer window.

b. Select the light blue Console cable by clicking it. The mouse pointer will change to what
appears to be a connector with a cable dangling off of it.
c. Click PC1; a window displays an option for an RS-232 connection.

d. Drag the other end of the console connection to the S1 switch and click the switch to bring up
the connection list.

e. Select the Console port to complete the connection.

Instructions:
1:

2:
3:
Step 2: Establish a terminal session with S1.
a. Click PC1 and then select the Desktop tab.

b. Click the Terminal application icon; verify that the Port Configuration default settings are correct.

What is the setting for bits per second? 9600


c. Click OK.

d. The screen that appears may have several messages displayed. Somewhere on the display
there should be a Press RETURN to get started! message. Press ENTER.

What is the prompt displayed on the screen? S1>


Step 3: Explore the IOS Help.
a. The IOS can provide help for commands depending on the level being accessed. The prompt
currently being displayed is called User EXEC and the device is waiting for a command. The most
basic form of help is to type a question mark (?) at the prompt to display a list of commands.

S1> ?
Which command begins with the letter ‘C’? connect
b. At the prompt, type t, followed by a question mark (?).

S1> t?
Which commands are displayed? telnet terminal traceroute
c. At the prompt, type te, followed by a question mark (?).

S1> te?
Which commands are displayed? telnet terminal
This type of help is known as context-sensitive Help, providing more information as the commands
are expanded.

Part 2: Exploring EXEC Modes


In Part 2 of this activity, you switch to privileged EXEC mode and issue additional commands.

Step 1: Enter privileged EXEC mode.


a. At the prompt, type the question mark (?).

S1> ?
What information is displayed that describes the enable command? Turn on privileged commands
b. Type en and press the Tab key.
S1> en
What displays after pressing the Tab key? enable
This is called command completion or tab completion. When part of a command is typed, the Tab
key can be used to complete the partial command. If the characters typed are enough to make the
command unique, as in the case with the enable command, the remaining portion is displayed.

What would happen if you were to type te at the prompt?

There is more than one command that begins with the letters ‘te because ‘te’ does not provide enough
characters to make the command unique. The characters will continue to display prompting the user
for additional characters to make the command unique.
c. Enter the enable command and press ENTER. How does the prompt change? It changes from
S1> to S1#, which indicates privileged EXEC mode.
d. When prompted, type the question mark (?).

S1# ?
Previously there was one command that started with the letter ‘C’ in user EXEC mode. How many
commands are displayed now that privileged EXEC mode is active? (Hint: you could type c? to list
just the commands beginning with ‘C’.)

5 – clear, clock, configure, connect, and copy


Step 2: Enter Global Configuration mode.
a. One of the commands starting with the letter ‘C’ is configure when in Privileged EXEC mode.
Type either the full command or enough of the command to make it unique along with the key to
issue the command and press .

S1# configure
a. What is the message that is displayed?

Configuring from terminal, memory, or network [terminal]?


b. Press the key to accept the default parameter enclosed in brackets [terminal].
How does the prompt change? S1(config)#
c. This is called global configuration mode. This mode will be explored further in upcoming
activities and labs. For now exit back to Privileged EXEC mode by typing end, exit or Ctrl-Z.

S1(config)# exit
S1#
Part 3: Setting the Clock
Step 1: Use the clock command.
a. Use the clock command to further explore Help and command syntax. Type show clock at the
privileged EXEC prompt.

S1# show clock


What information is displayed? What is the year that is displayed?

UTC Mon Mar 1 1993 preceded by the hours, minutes, and seconds since the device started. The year
is 1993.
b. Use the context-sensitive Help and the clock command to set the time on the switch to the
current time. Enter the command clock and press ENTER.

S1# clock
What information is displayed? % Incomplete command
c. The % Incomplete command message is returned by the IOS indicating that the clock command
needs further parameters. Any time more information is needed help can be provided by typing a
space after the command and the question mark (?).

S1# clock ?
What information is displayed? set Set the time and date
d. Set the clock using the clock set command. Continue proceeding through the command one
step at a time.

S1# clock set ?


What information is being requested? hh:mm:ss Current Time
What would have been displayed if only the clock set command had been entered and no request
for help was made by using the question mark? % Incomplete command
e. Based on the information requested by issuing the clock set ? command, enter a time of 3:00
p.m. by using the 24-hour format of 15:00:00. Check to see if further parameters are needed.
S1# clock set 15:00:00 ?
The output returns the request for more information:
Day of the month
MONTH Month of the year

f. Attempt to set the date to 01/31/2035 using the format requested. It may be necessary to
request additional help using the context-sensitive Help to complete the process. When finished,
issue the show clock command to display the clock setting. The resulting command output should
display as:

S1# show clock


*15:0:4.869 UTC Tue Jan 31 2035
g. If you were not successful, try the following command to obtain the output above:

S1# clock set 15:00:00 31 Jan 2035


Step 2: Explore additional command messages.
a. The IOS provides various outputs for incorrect or incomplete commands as experienced in
earlier sections. Continue to use the clock command to explore additional messages that may be
encountered as you learn to use the IOS.

b. Issue the following command and record the messages:

S1# cl
What information was returned? % Ambiguous command: “cl”
S1# clock
What information was returned? % Incomplete command.
S1# clock set 25:00:00
What information was returned?

S1#clock set 25:00:00


^
% Invalid input detected at ‘^’ marker.
S1# clock set 15:00:00 32
What information was returned?

S1#clock set 15:00:00 32


^
% Invalid input detected at ‘^’ marker.
Suggested Scoring Rubric

2.2.3.3/2.2.3.4 Packet Tracer – Configuring Initial


Switch Settings Instructions Answer
Packet Tracer – Configuring Initial Switch Settings

Objectives
Part 1: Verify the Default Switch Configuration
Part 2: Configure a Basic Switch Configuration

Part 3: Configure a MOTD Banner

Part 4: Save Configuration Files to NVRAM

Part 5: Configure S2

Background
In this activity, you will perform basic switch configurations. You will secure access to the
command-line interface (CLI) and console ports using encrypted and plain text passwords. You
will also learn how to configure messages for users logging into the switch. These banners are
also used to warn unauthorized users that access is prohibited.

Part 1: Verify the Default Switch Configuration


Step 1: Enter privileged mode.
You can access all switch commands from privileged mode. However, because many of the
privileged commands configure operating parameters, privileged access should be password-
protected to prevent unauthorized use.

The privileged EXEC command set includes those commands contained in user EXEC mode, as
well as the configure command through which access to the remaining command modes are
gained.
a. Click S1 and then the CLI tab. Press Enter
b. Enter privileged EXEC mode by entering the enable command:

Switch> enable
Switch#
Notice that the prompt changed in the configuration to reflect privileged EXEC mode.

Step 2: Examine the current switch configuration.


a. Enter the show running-config command.

Switch# show running-config


b. Answer the following questions:

How many FastEthernet interfaces does the switch have? 24


How many Gigabit Ethernet interfaces does the switch have? 2
What is the range of values shown for the vty lines? 0 -15
Which command will display the current contents of non-volatile random-access memory
(NVRAM)?

show startup-configuration
Why does the switch respond with startup-config is not present?
It displays this message because the configuration file was not saved to NVRAM. Currently it is only
located in RAM.
Part 2: Create a Basic Switch Configuration
Step 1: Assign a name to a switch.
To configure parameters on a switch, you may be required to move between various configuration
modes. Notice how the prompt changes as you navigate through the switch.

Switch# configure terminal


Switch(config)# hostname S1
S1(config)# exit
S1#
Step 2: Secure access to the console line.
To secure access to the console line, access config-line mode and set the console password to
letmein.

S1# configure terminal


Enter configuration commands, one per line. End with CNTL/Z.
S1(config)# line console 0
S1(config-line)# password letmein
S1(config-line)# login
S1(config-line)# exit
S1(config)# exit
%SYS-5-CONFIG_I: Configured from console by console
S1#
Why is the login command required?

In order for the password checking process to work, it requires both


the login and password commands
Step 3: Verify that console access is secured.
Exit privileged mode to verify that the console port password is in effect.

S1# exit
Switch con0 is now available
Press RETURN to get started.
User Access Verification
Password:
S1>
Note: If the switch did not prompt you for a password, then you did not configure
the login parameter in Step 2.
Step 4: Secure privileged mode access.
Set the enable password to c1$c0. This password protects access to privileged mode.

Note: The 0 in c1$c0 is a zero, not a capital O. This password will not grade as correct until after
you encrypt it in Step 8.
S1> enable
S1# configure terminal
S1(config)# enable password c1$c0
S1(config)# exit
%SYS-5-CONFIG_I: Configured from console by console
S1#
Step 5: Verify that privileged mode access is secure.
a. Enter the exit command again to log out of the switch.

b. Press and you will now be asked for a password:

User Access Verification


Password:
c. The first password is the console password you configured for line con 0. Enter this password to
return to user EXEC mode.

d. Enter the command to access privileged mode.

e. Enter the second password you configured to protect privileged EXEC mode.

f. Verify your configurations by examining the contents of the running-configuration file:

S1# show running-configuration


Notice how the console and enable passwords are both in plain text. This could pose a security
risk if someone is looking over your shoulder.

Step 6: Configure an encrypted password to secure access to privileged mode.


The enable password should be replaced with the newer encrypted secret password using the
enable secret command. Set the enable secret password to itsasecret.

S1# config t
S1(config)# enable secret itsasecret
S1(config)# exit
S1#
Note: The enable secret password overrides the enable password. If both are configured on the
switch, you must enter the enable secret password to enter privileged EXEC mode.
Step 7: Verify that the enable secret password is added to the configuration file.
a. Enter the show running-configuration command again to verify the new enable secret password
is configured.

Note: You can abbreviate show running-configuration as


S1# show run
b. What is displayed for the enable secret password? $1$mERr$ILwq/b7kc.7X/ejA4Aosn0
c. Why is the enable secret password displayed differently from what we configured?

The enable secret is shown in encrypted form, whereas the enable password is in plain text.
Step 8: Encrypt the enable and console passwords.
As you noticed in Step 7, the enable secret password was encrypted, but the enable and console
passwords were still in plain text. We will now encrypt these plain text passwords using the service
password-encryption command.
S1# config t
S1(config)# service password-encryption
S1(config)# exit
If you configure any more passwords on the switch, will they be displayed in the configuration file
as plain text or in encrypted form? Explain why?

The service password-encryption command encrypts all current and future passwords.
Part 3: Configure a MOTD Banner
Step 1: Configure a message of the day (MOTD) banner.
The Cisco IOS command set includes a feature that allows you to configure messages that
anyone logging onto the switch sees. These messages are called message of the day, or MOTD
banners. Enclose the banner text in quotations or use a delimiter different from any character
appearing in the MOTD string.

S1# config t
S1(config)# banner motd “This is a secure system. Authorized Access Only!”
S1(config)# exit
%SYS-5-CONFIG_I: Configured from console by console
S1#
When will this banner be displayed?

The message will be displayed when someone enters the switch through the console port.
Why should every switch have a MOTD banner?

Every switch should have a banner to warn unauthorized users that access is prohibited but can also
be used for sending messages to network personnel/technicians (such as impending system shutdowns
or who to contact for access)
Part 4: Save Configuration Files to NVRAM
Step 1: Verify that the configuration is accurate using the show run command.
Step 2: Save the configuration file.
You have completed the basic configuration of the switch. Now back up the running configuration
file to NVRAM to ensure that the changes made are not lost if the system is rebooted or loses
power.

S1# copy running-config startup-config


Destination filename [startup-config]?[Enter]
Building configuration…
[OK]
What is the shortest, abbreviated version of the copy running-config startup-config command? cop
rs
Step 3: Examine the startup configuration file.
Which command will display the contents of NVRAM? show startup-config
Are all the changes that were entered recorded in the file? Yes, it is the same as the running
configuration.
Part 5: Configure S2
You have completed the configuration on S1. You will now configure S2. If you cannot remember
the commands, refer to Parts 1 to 4 for assistance.
Configure S2 with the following parameters:
a. Name device: S2

b. Protect access to the console using the letmein password.

c. Configure an enable password of c1$c0 and an enable secret password of itsasecret.

d. Configure a message to those logging into the switch with the following message:

Authorized access only. Unauthorized access is prohibited and violators will be prosecuted to the full extent
of the law.
e. Encrypt all plain text passwords.

f. Ensure that the configuration is correct.

g. Save the configuration file to avoid loss if the switch is powered down.

Switch> enable
Switch# config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# hostname S2
S2(config)# line console 0
S2(config-line)# password letmein
S2(config-line)# login
S2(config-line)# enable password c1$c0
S2(config)# enable secret itsasecret
S2(config)# banner motd $any text here$
S2(config)# service password-encryption
S2(config)# do copy running-config startup-config
Suggested Scoring Rubric

Instructions:
Switch 1 – S1
Switch>enable
Switch#configure terminal
Switch(config)#hostname S1
S1(config)#line console 0
S1(config-line)#password letmein
S1(config-line)#login
S1(config-line)#exit
S1(config)#exit
S1#configure terminal
S1(config)#enable password c1$c0
S1(config)#exit
S1#configure terminal
S1(config)#ena sec itsasecret
S1(config)#exit
S1(config)#service password-encryption
S1(config)#exit
S1#configure terminal
S1(config)#banner motd #This is a secure system. Authorized Access Only!#
S1(config)#exit
S1#copy running-config startup-config
Switch 2 – S2
Switch>enable
Switch#configure terminal
Switch(config)#hostname S2
S2(config)#line console 0
S2(config-line)#password letmein
S2(config-line)#login
S2(config-line)#exit
S2(config)#exit
S2#configure terminal
S2(config)#enable password c1$c0
S2(config)#exit
S2#configure terminal
S2(config)#ena sec itsasecret
S2(config)#exit
S2(config)#service password-encryption
S2(config)#exit
S2#configure terminal
S2(config)#banner motd #Authorized access only. Unauthorized access is prohibited and violators will be
prosecuted to the full extent of the law.#
S2(config)#exit
S2#copy running-config startup-config

Anda mungkin juga menyukai